Skip to main content
Log in

An anonymous data access scheme for VANET using pseudonym-based cryptography

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Vehicular ad-hoc network (VANET) is an emerging technology which can offer a wide variety of promising applications, such as safety-related and infotainment applications. However, VANET also raises important security and privacy concerns that must be properly addressed for widespread deployment. In this paper, we first proposed a provable secure pseudonym-based cryptosystem with a trusted authority, including a pseudonym-based encryption scheme, a pseudonym-based multi-receiver encryption scheme, a pseudonym-based signature scheme, and a pseudonym-based one-pass key establishment protocol. We then presented a secure and efficient data access scheme for VANET based on cooperative caching technology and the proposed pseudonym-based cryptosystem. The efficiency of data access was greatly improved by allowing the sharing and coordination of cached data among multiple vehicles, and the anonymity of vehicles, data confidentiality, integrity and non-repudiation were guaranteed by employing the proposed pseudonym-based cryptosystem. Simulation results have shown that the proposed data access scheme is suitable to the VANET environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Abbani N, Artail H (2015) Protecting data flow anonymity in mobile ad hoc networks that employ cooperative caching. Ad Hoc Netw 26(0):69–87. ISSN 1570–8705. doi:10.1016/j.adhoc.2014.10.018. http://www.sciencedirect.com/science/article/pii/S1570870514002340

  • Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111–128. ISSN 2190–8508. doi:10.1007/s13389-013-0057-3

  • Baek J, Newmarch J, Safavi-naini R, Susilo W (2004) A survey of identity-based cryptography. In: Proceedings of Australian unix users group annual conference, pp 95–102

  • Biswas S, Misic J (2013) A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Trans Veh Technol 62(5):2182–2192. ISSN 0018–9545. doi:10.1109/TVT.2013.2238566

  • Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science. Springer, Berlin, pp 213–229. ISBN 978-3-540-42456-7. doi:10.1007/3-540-44647-8_13

  • Burmester M, Magkos E, Chrissikopoulos V (2008) Strengthening privacy protection in vanets. In: Networking and communications, 2008. WIMOB’08. IEEE international conference on wireless and mobile computing, pp 508–513, Oct 2008. doi:10.1109/WiMob.2008.32

  • Choon J, Hee Cheon J (2002) An identity-based signature from gap Diffie–Hellman groups. In: Desmedt YVOG (ed) Public key cryptography—PKC 2003, volume 2567 of lecture notes in computer science. Springer, Berlin, pp 18–30. ISBN 978-3-540-00324-3. doi:10.1007/3-540-36288-6_2

  • Dahiya A, Chauhan D (2010) A comparative study of manet and vanet environment. J Comput 2(7):87–92

    Google Scholar 

  • Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Proceedings of the 19th annual international cryptology conference on advances in cryptology, CRYPTO ’99, London, UK. Springer, pp 537–554. ISBN 3-540-66347-9. http://dl.acm.org/citation.cfm?id=646764.706343

  • Fujisaki E, Okamoto T (2013) Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26(1):80–101. ISSN 0933–2790. doi:10.1007/s00145-011-9114-1

  • Gorantla MC, Boyd C, Nieto JMG (2008) Id-based one-pass authenticated key establishment. In: Proceedings of the sixth Australasian conference on information security—volume 81, AISC ’08, Darlinghurst, Australia, Australia. Australian Computer Society, Inc., pp 39–46. ISBN 978-1-920682-62-0. http://dl.acm.org/citation.cfm?id=1385109.1385118

  • Li C-T, Hwang M-S, Chu Y-P (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31(12):2803–2814. ISSN 0140–3664. doi:10.1016/j.comcom.2007.12.005. http://www.sciencedirect.com/science/article/pii/S0140366407005154. Mobility Protocols for ITS/VANET

  • Li F, Wang Y (2007) Routing in vehicular ad hoc networks: a survey. Veh Technol Mag IEEE 2(2):12–22. ISSN 1556–6072. doi:10.1109/MVT.2007.912927

  • Lynn B (2014) The pairing-based cryptography library. http://crypto.stanford.edu/pbc/. Accessed 18 July 2014

  • Razzaque MA, Ahmad Salehi S, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In: Khan S, Khan Pathan A-S (eds) Wireless networks and security. Signals and communication technology. Springer, Berlin, Heidelberg, pp 107–132

  • Sailhan F, Issarny V (2003) Cooperative caching in ad hoc networks. In: Chen M-S, Chrysanthis PK, Sloman M, Zaslavsky A (eds) Mobile data management, volume 2574 of lecture notes in computer science. Springer, Berlin, pp 13–28. ISBN 978-3-540-00393-9. doi:10.1007/3-540-36389-0_2

  • Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology, volume 196 of lecture notes in computer science. Springer, Berlin, pp 47–53. ISBN 978-3-540-15658-1. doi:10.1007/3-540-39568-7_5

  • Sun J, Zhang C, Fang Y (2007) An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Military communications conference, 2007. MILCOM 2007. IEEE, pp 1–7. doi:10.1109/MILCOM.2007.4454834

  • Ting I-W, Chang Y-K (2013) Improved group-based cooperative caching scheme for mobile ad hoc networks. J Parallel Distrib Comput 73(5):595–607. ISSN 0743–7315. doi:10.1016/j.jpdc.2012.12.013. http://www.sciencedirect.com/science/article/pii/S0743731512002948

  • Tseng Y-M, Huang Y-H, Chang H-J (2012) Cca-secure anonymous multi-receiver id-based encryption. In: 26th international conference on advanced information networking and applications workshops (WAINA), pp 177–182, March 2012. doi:10.1109/WAINA.2012.50

  • Yin L, Cao G (2006) Supporting cooperative caching in ad hoc networks. IEEE Trans Mobile Comput 5(1):77–89. ISSN 1536–1233. doi:10.1109/TMC.2006.15

  • Zhao J, Zhang P, Cao G, Das CR (2010) Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans Parallel Distrib Syst 21(2):229–241. ISSN 1045–9219. doi:10.1109/TPDS.2009.50

Download references

Acknowledgments

This paper is jointly supported by the National Natural Science Foundation of China (Grant No. 61173189), the Foundation for Innovative Research Team of Yunnan University, Guangdong Province Information Security Key Laboratory Project, Yunnan Province Software Engineering Key Laboratory Project (Grant No. 2015SE203).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changji Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, C., Shi, D., Xu, X. et al. An anonymous data access scheme for VANET using pseudonym-based cryptography. J Ambient Intell Human Comput 7, 63–71 (2016). https://doi.org/10.1007/s12652-015-0301-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0301-z

Keywords

Navigation